Archive for the ‘Quantum Computing’ Category

Securing IoT in the Quantum Age – Eetasia.com

Article By : Maurizio Di Paolo Emilio

Quantum computers will make security mechanisms vulnerable to new types of cyberattacks a problem for both chip cards and complex technological systems...

Quantum computers will make current security mechanisms vulnerable to new types of cyberattacks a real problem for both chip cards and complex technological systems such as networked vehicles or industrial control systems. They have the potential to break the cryptographic patterns widely used in internet of things data communication systems.

With the advent of quantum computers, modern encryption algorithms are undergoing an evolution that will significantly change their current use. In order to support the security of the internet and other cryptographic-based technologies, it is necessary to increase mathematical research to build the cryptography of tomorrow, which is resistant to quantum attacks and will become known as post-quantum or quantum-resistant cryptography.

A quantum computer that could break cryptography would be a powerful tool for attackers, said Dr. Thomas Poeppelmann, senior staff engineer, Infineon Technologies.

According to the latest Thales Data Threat Report, 72 percent of the security experts surveyed worldwide believe that quantum computing power will affect data security technologies within the next five years. Robust and future-proof security solutions are therefore necessary. The potential threats are widespread, everything from the cars of the future to industrial robots.

IoT security

The modern use of cryptography aims to help ensure the confidentiality, authenticity, and integrity of the multiple data traveling in the IoT ecosystem, both the consumer and industrial one.

Security requirements of IoT devices can be very complex, said Poeppelmann. As a result, security cannot be achieved by a single technology or method. For example, a vendor has to consider aspects like secured software development, protected patch management, supply chain security, protection against physical attacks, trust and identity management, and secured communication.

Many companies, such as Infineon, are developing chip-based quantum security mechanisms. In particular, the applicability and practical implementation of quantum security cryptographic methods for embedded systems will be highlighted.

An IoT device has to check that a software update is really from the vendor and that it was not created by an attacker, said Poeppelmann. If the cryptographic methods used in an IoT device can be broken by an attacker, this would expose it to a lot of vulnerabilities. With quantum-safe cryptography, we want to provide our customers with cryptographic methods that are even protected against attacks using quantum computers. With our post-quantum technology, we aim to provide security in the long term and against very powerful attackers.

A classic computer attacker can use all the necessary means, such as artificial intelligence and increasingly powerful computers, to defeat security barriers.

Depending on the results and tasks, an attacker may be willing to spend several months of work to break a cryptographic pattern. Developers must provide maximum security that is accessible and easy-to-integrate solutions.

The security industry is developing cryptography that can be executed on cost-efficient classical computers or even tiny smart card chips while being guarded against even the most powerful attackers, said Poeppelmann.

He added, This situation is also applicable to the development of post-quantum cryptography that should withstand quantum computing power. The defender could still be implementing cryptography on classical computers and machines, while the attacker may use a quantum computer in the near future. Current approaches for so-called quantum-key distribution [QKD], where quantum technology is used to achieve confidentiality, are currently too expensive or too constraining, whereas current assessments of post-quantum cryptography prove that it could be quantum-safe as well as affordable. This is why we at Infineon focus on the development of post-quantum cryptography [PQC].

Security for IoT(Image: Infineon Technologies)

Large-scale QKD technology has already been tested in several countries to provide secure quantum protection to critical infrastructures.

Today, cryptography is used in many applications in automobiles and industrial control equipment. This aims to prevent the transfer of malware that could disrupt security systems and seriously endanger independent driving and production equipment.

Conventional encryption tools such as elliptical curve encryption are indestructible for todays computers. However, with constant progress in the development of quantum computers, many encryption algorithms may become ineffective in the near future.

Projects

The project Aquorypt will investigate the applicability and practical implementation of quantum-safe cryptographic methods for embedded systems. The project team evaluates procedures that have an adequate security level and implements them efficiently in hardware and software. The results could be used to protect industrial control systems with a long service life.

In the Aquorypt research project, the Technical University of Munich (TUM) will collaborate with researchers and industrial partners to develop new protection measures for the quantum computing era.

The project will first assess several new protocols and check if the new protocols are suitable for the use cases; i.e. industrial control and chip cards, said Poeppelmann. The best way to build a secured system is always a combination of appropriate software and hardware methods. However, some security goals cannot be achieved if the underlying hardware is not secured. Some bugs cannot be fixed by software alone.

Another project, PQC4MED, is focused on embedded systems in medical products. The associated hardware and software must allow the exchange of cryptographic procedures to counteract external threats. The solution will be tested in a use case in the field of medical technology.

In health-care applications, data privacy and data security are of particular importance, said Poeppelmann. Moreover, these devices have been in the field for a very long time so that software needs to be updated to comply with the latest regulations. As a consequence, it is important to first understand how suppliers of health-care devices could handle the threats caused by attacks using quantum computers. And secondly, [it is important] to research how they can implement software updates and software management mechanisms that allow [protection of] a device over its life cycle of more than 20 years. If the security of the update mechanism is low, an attacker will always take the path of least resistance and attack this component.

Infineon is working in this field for the development and standardization of New Hope and SPHINCS+ quantum security cryptographic schemes. New Hope is a key exchange protocol based on the Ring-Learning-with-Errors (Ring-LWE, or RLWE) problem.

Ring-LWE has been designed to protect against cryptoanalysis of quantum computers and also to provide the basis for homomorphic encryption. A key advantage of RLWE-based cryptography is in the size of the public and private keys.

SPHINCS+ is a stateless hash-based signature scheme based on conservative security assumptions.

Googles quantum computer

Conclusion

Cyberattacks on industrial plants could lead to the theft of knowledge about production processes or to tampering plants with a loss of production efficiency. Over time, electronic systems will become increasingly more networked and information security will play a key role.

As for security, post-quantum cryptography now mainly needs standards and awareness, said Poeppelmann. The standards are required to grant interoperability of different systems; e.g., an IoT device communicating with a cloud system. Device manufacturers, on the other hand, should be aware that quantum computers can become a real threat to their solutions security. They should assess future risks as properly [as possible] and implement appropriate security as early as possible.

In addition to security, a second factor in determining whether a cryptographic algorithm can be used in a given application environment is its efficiency. The performance takes into account not only processing speed but also memory requirements: key size, data expansion speed, signature size, etc. For example, schemes based on more structured mathematical problems tend to have reduced keys.

Quantum technology such as quantum computers or quantum sensors have different requirements for market adoption, said Poeppelmann. For the adoption of quantum computers, we need a computer that is really able to prove a benefit for real-world tasks (e.g., chemical analysis, AI, etc.) over currently used cloud methods. In general, it is important to raise awareness to foster market adoption of quantum-resistant cryptography. The threat is real, but with PQC, we have a migration path available.

Improving the strength of encryption remains a goal for many IT security experts. As computers become smarter and faster and codes become easier to decode, a more advanced encryption mechanism is more urgently needed.

Related

Continued here:
Securing IoT in the Quantum Age - Eetasia.com

Inside the Global Race to Fight COVID-19 Using the World’s Fastest Supercomputers – Scientific American

As the director of a global research organization, I feel obligated to use all the resources of cutting-edge science and technology at our disposal to fight this scourge. As a father, I want a lasting solution, one that serves not just in this crisis, but the next. And, as an American and a Spaniard, with family in two hot spots, I want to help. Its as simple as that.

It started with a phone call to the White House on Tuesday, March 17, one that proved to be a catalytic moment for industry, academia and government to act together. This was the same week I received news from my mother that my cousin in Spain had tested positive for coronavirus. Shes a doctor and, just like all medical staff around the world right now, is on the front lines of the fight against this disease. This fight is personal for so many of us.

COVID-19 is deadly serious. This respiratory disease is triggered by a virus from the family of coronaviruses, which was identified in the 1960s but had never made such an assault on humanity. The virus prevents its victims from breathing normally, making them gasp for air. Fever, cough, a sore throat and a feeling of overwhelming fatigue and helplessness follow. Lucky ones recover within a few days; some show only mild or moderately severe symptoms. But some patients are not that lucky. Bulldozing its way through the body, the virus makes the lungs fill up with fluid, and may lead to a rapid death. No one is immune. While the elderly and those with underlying health conditions are more at risk, COVID-19 has taken the lives of people of all ages, some in seemingly good health. The disease is bringing our world to its knees.

But we are resilient, and we are fighting back with all the tools we have, including some of the most sophisticated supercomputers we have ever built. These machinesmore than 25 U.S.-based supercomputers with more than 400 petaflops of computing powerare now available for free to scientists searching for a vaccine or treatment against the virus, through the COVID-19 High Performance Computing Consortium.

It was created with government, academia and industryincluding competitors, working side by side. IBM is co-leading the effort with the U.S. Department of Energy, which operates the National Laboratories of the United States. Google, Microsoft, Amazon and Hewlett Packard Enterprise have joined, as well as NASA, the National Science Foundation, Pittsburgh Supercomputing Center and six National LabsLawrence Livermore, Lawrence Berkeley, Argonne, Los Alamos, Oak Ridge and Sandia, and others. And then there are academic institutions, including MIT; Rensselaer Polytechnic Institute; the University of Texas, Austin; and the University of California, San Diego.

The supercomputers will run a myriad of calculations in epidemiology, bioinformatics and molecular modeling, in a bid to drastically cut the time of discovery of new molecules that could lead to a vaccine. Having received proposals from all over the world, we have already reviewed, approved and matched 15 projects to the right supercomputers. More will follow.

But just a few days ago none of this existed.

On March 17, I called Michael Kratsios, the U.S. governments chief technology officer. Embracing the potential of a supercomputing consortium, he immediately started mobilizing his team, including Jake Taylor, assistant director for quantum information science at the White House Office of Science and Technology Policy. Jake called major U.S. players that have high-performance computers and invited them on board. From the IBM side, Mike Rosenfield, whose team has designed and built multiple generations of world-leading supercomputers, partnered with RPI, MIT and the key computing leaders of the U.S. National Laboratories. The U.S. Department of Energy has been a partner from the very beginning, at the heart of it all.

Within 24 hours of that first call, collaborators outlined what it meant to be involved. We brainstormed how we would communicate to research labs worldwide what we could offer in terms of hardware, software and human experts, and how we would get them to submit proposals, and get those matched with just the right supercomputer.

Forty-eight hours passed. On Thursday, March 19, we set up the scientific review committee and the computing matching committee to manage proposals. At least one person from each of the members of the consortium had to be part of the process, all acting fairly and equally. From IBM, Ajay Royyuru joined the merit review committee; he is the leader of our Healthcare and Life Sciences research and together with his team has long been developing novel technologies to fight cancer and infectious diseases.

Ajay, too, has a personal stake in fighting back against COVID-19. In January, his elderly father passed away following a pulmonary illness. Ajay shares his house with his 82-year-old mother, and he worries about keeping her safe from this risk, just like so many of us worry about our parents. His extended family in India is now also confronting the unfolding of the pandemic.

On March 22, less than a week after the first discussion with Kratsios, the White House announced the consortium. Everyone knew that the clock was ticking.

It is still very early days, but Ajay and other reviewers can clearly see from the first wave of proposals that scientists are trying to attack the virus on all frontsfrom drug discovery and development with AI-led simulations to genomics, epidemiology and health systems response. We need to understand the whole life cycle of this virus, all the gearboxes that drive ithow it encounters and infects the host cell and replicates inside it, preventing it from producing vital particles. We need to know the molecular components, the proteins involved in the virus biochemistrythen to use computational modeling to see how we can interrupt the cycle. That's the standard scientific methodology of drug discovery, but we want to amplify it.

The virus has been exploding in humans for months now, providing an abundance of samples for computer modeling and analysis. Scientists are already depositing them into public data sources such as GenBank and Protein Data Bank. There are many unknowns and assumptionsbut, Ajay tells me, a lot of proposals involve using the available protein structures to try and come up with potential molecular compounds that could lead to a therapeutic or a vaccine.

Thats already happening. Even before we formed the consortium, researchers at Oak Ridge National Laboratory and the University of Tennessee simulated 8,000 compounds and found 77 molecules that could potentially disarm the virus. But 77 is still a big number and running tests to find the correct molecule may take months. Here, my colleague Alessandro Curioni, an Italian chemist who heads IBM Research Europe and who had to self-isolate due to possible exposure to COVID-19, had an idea on how to speed things up.

In a conversation with European Commission executives in early March, Alessandro learned about an Italian pharmaceutical company, Domp Farmaceutici and the E.U.-financed project they were working on. Last week, he orchestrated a meeting between its scientists and Oak Ridge, suggesting to both parties that they submit a joint proposal to the consortium. Perhaps together, with the help of supercomputers, they can reduce the number of the promising compounds from 77 to 10, five and, finally, one.

Humanity has more tools at its disposal in this pandemic than ever before. With data, supercomputers and artificial intelligence, and in the future, quantum computing, we will create an era of accelerated discovery. The consortium is an example of a unique partnership approach, and it shows that the bigger the challenge, the more we need each other.

Read more about the coronavirus outbreakhere.

See the rest here:
Inside the Global Race to Fight COVID-19 Using the World's Fastest Supercomputers - Scientific American

Quantum Computing strikes technology partnership with Splunk – Proactive Investors USA & Canada

Initial efforts with San Franciscos Splunk will focus on three key challenges: network security, dynamic logistics and scheduling

Quantum Computing Inc (OTC:QUBT), an advanced technology company developing quantum-ready applications and tools, said Tuesday that it has struck a technology alliance partnership with ().

San Francisco, California-based Splunk creates software for searching, monitoring, and analyzing machine-generated big data via a web-style interface.

Meanwhile, staffed by experts in mathematics, quantum physics, supercomputing, financing and cryptography, Leesburg, Virginia-based Quantum Computing is developing an array of applications to allow companies to exploit the power of quantum computing to their advantage. It is a leader in the development of quantum ready software with deep experience developing applications and tools for early quantum computers.

Splunk brings a leading big-data-analytics platform to the partnership, notably existing capabilities in its Machine/Deep Learning Toolkit in current use by Splunk customers, said the company.

Implementation of quantum computing applications will be significantly accelerated by tools that allow the development and execution of applications independent of any particular quantum computing architecture.

We are excited about this partnership opportunity, said Quantum Computing CEO Robert Liscouski. Splunk is a proven technology leader with over 17,500 customers world-wide, that has the potential to provide great opportunities for QCIs quantum ready software technologies.

Both the companies will partner to do fundamental and applied research and develop analytics that exploit conventional large-data cybersecurity stores and data-analytics workflows, combined with quantum-ready graph and constrained-optimization algorithms.

The company explained that these algorithms will initially be developed using Quantums Mukai software platform, which enables quantum-ready algorithms to execute on classical hardware and also to run without modification on quantum computing hardware when ready.

Once proofs of concept are completed, QCI and Splunk will develop new analytics with these algorithms in the Splunk data-analytics platform, to evaluate quantum analytics readiness on real-world data, noted the company.

The Splunk platform/toolkits help customers address challenging analytical problems via neural nets or custom algorithms, extensible to Deep Learning frameworks through an open source approach that incorporates existing and custom libraries.

The initial efforts of our partnership with Splunk will focus on three key challenges: network security, dynamic logistics and scheduling, said Quantum Computing.

Contact the author Uttara Choudhury at[emailprotected]

Follow her onTwitter:@UttaraProactive

Go here to read the rest:
Quantum Computing strikes technology partnership with Splunk - Proactive Investors USA & Canada

Outlook on the Global Stabilizing Quantum Bits for Computing Market to 2030 – ResearchAndMarkets.com – Yahoo Finance

The "Stabilizing Quantum Bits for Computing" report has been added to ResearchAndMarkets.com's offering.

The Report Includes:

Quantum computing entered an era of early commercialization in 2019. Governments subsequently decided to spend billions of dollars to support basic quantum computing research in universities and research institutions. Technology companies such as IBM, Google, Microsoft, D-Wave Systems, Intel, and Zapata developed hardware, software, and solutions that demonstrate the power of quantum computing in solving real-world problems.

Leading players in various industries, such as BASF, Dow, Airbus, and Volkswagen, have stepped into the field of quantum computing, hoping this game-changing technology can help them significantly improve efficiency or quality by simulating or optimizing production, supply chains, and many other areas.

In 2020, government-funded research projects in universities and research institutions will bring approximately $50 million in sales of hardware, software and services to quantum computing companies, which can be segmented into three groups. IBM, Google, Microsoft, and D-Wave Systems are leading companies that provide a full range of solutions from quantum computing hardware to software and services. Alibaba, Honeywell, Rigetti Computing, Xanadu, and several other companies have a similar ambition.

Key Topics Covered:

Chapter 1 Quantum Computing: Emerging Opportunities

Chapter 2 References

List of Tables

Table 1: Global Quantum Computing Market, by End User, Through 2030

Table 2: Quantum Computing Progress, 2019-2020

Table 3: Global Quantum Computing Market for Industrial Users, by Application, Through 2030

Table 4: Global Quantum-Assisted Optimization Market for Industrial Users, by Application, Through 2030

Table 5: Global Quantum Simulation Market for Industrial Users, by Application, Through 2030

List of Figures

Figure 1: Global Quantum Computing Market, by End User, 2020-2030

Figure 2: Global Quantum Computing Market for Industrial Users, by Application, 2025 and 2030

Figure 3: Global Quantum-Assisted Optimization Market for Industrial Users, by Application, 2025 and 2030

Figure 4: Global Quantum Simulation Market for Industrial Users, by Application, 2025 and 2030

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/d9fd79

View source version on businesswire.com: https://www.businesswire.com/news/home/20200327005220/en/

Contacts

ResearchAndMarkets.comLaura Wood, Senior Press Managerpress@researchandmarkets.com For E.S.T Office Hours Call 1-917-300-0470For U.S./CAN Toll Free Call 1-800-526-8630For GMT Office Hours Call +353-1-416-8900

See the original post here:
Outlook on the Global Stabilizing Quantum Bits for Computing Market to 2030 - ResearchAndMarkets.com - Yahoo Finance

The Future of Privacy and Cybersecurity, Forecast to 2030 – Yahoo Finance

This study explores the rapidly-evolving landscape of privacy and cybersecurity triggered by a rise in the number of connected devices. By 2030, a complex mesh of 91 billion devices around the world will exist, with over 10 connected devices per human.

New York, March 30, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "The Future of Privacy and Cybersecurity, Forecast to 2030" - https://www.reportlinker.com/p05878610/?utm_source=GNW

Every connected device in a smart home or city will be a potential access point to our most sensitive and personal data.This constantly-evolving IoT landscape will expand beyond the traditional network in use today and will result in increasingly complex privacy and cybersecurity challenges.

Readers of the study will gain insight into these challenges in terms of understanding various new endpoints of privacy and cybersecurity, new types of threats looming in the industry, and efforts being made to fight them. The current global regulatory landscape around privacy and the increasing relevance of digital trust and enterprises ability to safeguard it are also discussed.

The study also focuses on evolving global threats such as nuclear hacks, dark web evolution and a state of cyber warfare. Investments and commitments to mitigate this and efforts made to close the gap in the cyber workforce are also outlined in the study. The analyst looks at numerous technology topics such as artificial intelligence (AI), data de-identification, advanced authentication and encryption, biometrics, blockchain, automation and quantum computing and its ability to transform privacy and cybersecurity. For each technology, its significance, impact on privacy and cybersecurity, as well as application potential are discussed. Over 20 innovation examples and emerging business models are provided throughout the study to serve as guideposts for readers. The study also discusses key scenarios in the future based on public interest and level of regulation to allow readers to derive an understanding of the intensity and implications of privacy and cyber threats on our daily lives. While the distinct scenarios are influenced by different positions taken by governments and individuals around the world, the future of privacy and cybersecurity will most likely be a combination of these scenarios. Our analysis of five key industries influenced by the changing landscape of privacy and cybersecurity includes automotive, energy, healthcare, smart cities, banking and financial services. When evaluating industries, we look at cybersecurity opportunity, challenges to implementation, key trends in the value chain, and emerging business models. Innovative companies at the forefront of cybersecurity pertaining to each industry are identified in order to provide strategic direction to readers. Governments, enterprises, and individuals can benefit from the strategic recommendations made in the study meant to provide guidance to mitigate future privacy and cybersecurity challenges through innovative partnerships, regulatory changes, workforce upgradation, technology leverage, and new business models. Finally, we identify three big outcomes and predictions for the future emerging from the evolution of privacy and cybersecurity. Author: Vinay VenkatesanRead the full report: https://www.reportlinker.com/p05878610/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Clare: clare@reportlinker.comUS: (339)-368-6001Intl: +1 339-368-6001

More:
The Future of Privacy and Cybersecurity, Forecast to 2030 - Yahoo Finance